Em Adespoton writes: Before the VirnetX case, nearly all FaceTime calls were done through a system of direct communication. Essentially, Apple would verify that both parties had valid FaceTime accounts and then allow their two devices to speak directly to each other over the Internet, without any intermediary or "relay" servers. However, a small number of calls—5 to 10 percent, according to an Apple engineer who testified at trial—were routed through "relay servers."
At the August 15 hearing, a VirnetX lawyer stated that Apple had logged "over half a million calls" complaining about the quality of FaceTime [since disabling direct connections].
Em Adespoton writes: "Had any network issues over the last week? CloudFlare, an AnyCast, Anti-DDoS network provider writes, "Our direct peers quickly filtered attack traffic at their edge. This pushed the attack upstream to their direct peers, largely Tier 1 networks. Tier 1 networks don't buy bandwidth from anyone, so the majority of the weight of the attack ended up being carried by them. While we don't have direct visibility into the traffic loads they saw, we have been told by one major Tier 1 provider that they saw more than 300Gbps of attack traffic related to this attack. That would make this attack one of the largest ever reported.""
Em Adespoton writes: "SophosLabs, the security research division of Sophos, Inc, has been tracking an increase in targeted attacks against hospitality and educational organizations. Active malware has been discovered that steals credit card data directly from memory for later retrieval by the criminals involved. This activity appears to go back as far as 2009, just like the Stuxnet/Duqu threat."
Em Adespoton writes: "It was a computer security story that made headlines around the world, involving the private emails of a woman who could have become Vice President of the United States. And now, it's ended with a young man sent to a federal prison, hundreds of miles from his family home.